created by - program studi informatika - fakultas ilmu ...if.binadarma.ac.id/sap/sap...

23
ISO 9001 : 2008 SYLLABUS FORM Doc. No : FRM/KUL/01/02 Revision No : 4 Date of Issue : October 01 st , 2011 ISO : 7.5.1 & 7 Created by Checked by Approved by Valid date Syahril Rizal, S.T., M.M., M.Kom. Syahril Rizal, S.T., M.M., M.Kom. M.Izman Herdiansyah, PhD 1. Faculty : Computer Science 2. Study Program : Information Technology Degree: S1 3. Programm : S1 Degree 4. Subject : Computer Networking 5. Subject Code : 6. Pra requirement Subject : 7. Subject Status : 8. Description : Data communications, network architectures, communication protocols, data link control, medium access control; introduction to local area networks metropolitan area networks and wide area networks; introduction to Internet and TCP/IP 9. Competencies :

Upload: phungnga

Post on 20-Mar-2018

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

ISO 9001 : 2008

SYLLABUS FORM

Doc. No : FRM/KUL/01/02

Revision No : 4

Date of Issue : October 01st , 2011

ISO : 7.5.1 & 7

Created by Checked by Approved by Valid date

Syahril Rizal, S.T., M.M., M.Kom. Syahril Rizal, S.T., M.M., M.Kom. M.Izman Herdiansyah, PhD

1. Faculty : Computer Science2. Study Program : Information Technology Degree: S13. Programm : S1 Degree4. Subject : Computer Networking 5. Subject Code :6. Pra requirement Subject :7. Subject Status :8. Description : Data communications, network architectures, communication protocols, data link control, medium access control; introduction to local area networks

metropolitan area networks and wide area networks; introduction to Internet and TCP/IP9. Competencies :10. Weekly Learning Process Implementation :

No Topic/ Learning Materials Sub Topic Reference Information

Page 2: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

1 Analyzing Business Goals and Con-straints

- Using a Top-Down Network Design Methodology - Using a Structured Network Design Process - Systems Development Life Cycles - Plan Design Implement Operate Optimize

(PDIOO) - Network Life Cycle - Analyzing Business Goals - Working with Your Client - Changes in Enterprise Networks - Networks Must Make Business Sense - Networks Offer a Service - The Need to Support Mobile Users - The Importance of Network Security and Re-

siliency - Typical Network Design Business Goals - Identifying the Scope of a Network Design

Project - Identifying a Customer’s Network Applications - Analyzing Business Constraints - Politics and Policies - Budgetary and Staffing Constraints - Project Scheduling - Business Goals Checklist - Summary - Review Questions - Design Scenario

- Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press

2 Analyzing Technical Goals and Trade-offs

- Scalability - Planning for Expansion - Expanding Access to Data - Constraints on Scalability - Availability - Disaster Recovery - Specifying Availability Requirements - Five Nines Availability - The Cost of Downtime - Mean Time Between Failure and Mean Time to - Repair - Network Performance

- Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press

Page 3: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

- Network Performance Definitions - Optimum Network Utilization - Throughput - Throughput of Internetworking Devices - Application Layer Throughput - Accuracy - Efficiency - Delay and Delay Variation - Causes of Delay - Delay Variation - Response Time - Security - Identifying Network Assets - Analyzing Security Risks - Reconnaissance Attacks - Denial-of-Service Attacks - Developing Security Requirements - Manageability - Usability - Adaptability - Affordability - Making Network Design Tradeoffs - Technical Goals Checklist - Summary - Review Questions - Design Scenario

3 Characterizing the Existing Internet-work

- Characterizing the Network Infrastructure - Developing a Network Map - Characterizing Large Internetworks - Characterizing the Logical Architecture - Developing a Modular Block Diagram - Characterizing Network Addressing and Naming- Characterizing Wiring and Media - Checking Architectural and Environmental - Constraints - Checking a Site for a Wireless Installation - Performing a Wireless Site Survey - Checking the Health of the Existing Internetwork

- Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press

Page 4: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

- Developing a Baseline of Network Performance - Analyzing Network Availability - Analyzing Network Utilization - Measuring Bandwidth Utilization by Protocol - Analyzing Network Accuracy - Analyzing Errors on Switched Ethernet Networks - Analyzing Network Efficiency - Analyzing Delay and Response Time - Checking the Status of Major Routers, Switches, - and Firewalls - Network Health Checklist - Summary - Review Questions - Hands-On Project - Design Scenario

4 Characterizing Network Traffic - Characterizing Traffic Flow - Identifying Major Traffic Sources and Stores - Documenting Traffic Flow on the Existing Net-

work - Characterizing Types of Traffic Flow for New - Network Applications - Terminal/Host Traffic Flow - Client/Server Traffic Flow - Peer-to-Peer Traffic Flow - Server/Server Traffic Flow - Distributed Computing Traffic Flow - Traffic Flow in Voice over IP Networks - Documenting Traffic Flow for New and Existing - Network Applications - Characterizing Traffic Load - Calculating Theoretical Traffic Load - Documenting Application-Usage Patterns - Refining Estimates of Traffic Load Caused by - Applications - Estimating Traffic Load Caused by Routing - Protocols - Characterizing Traffic Behavior - Broadcast/Multicast Behavior

- Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press

Page 5: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

- Network Efficiency - Frame Size - Windowing and Flow Control - Error-Recovery Mechanisms - Characterizing Quality of Service Requirements - ATM QoS Specifications - Constant Bit Rate Service Category - Real-time Variable Bit Rate Service Category - Non-real-time Variable Bit Rate Service Category - Unspecified Bit Rate Service Category - Available Bit Rate Service Category - Guaranteed Frame Rate Service Category - IETF Integrated Services Working Group QoS - Specifications - Controlled-Load Service - Guaranteed Service - IETF Differentiated Services Working Group QoS - Specifications - Grade of Service Requirements for Voice - Applications - Documenting QoS Requirements - Network Traffic Checklist - Summary - Review Questions - Design Scenario - Summary for Part I

5 Designing a Network Topology - Hierarchical Network Design - Why Use a Hierarchical Network Design Model? - Flat Versus Hierarchical Topologies - Flat WAN Topologies - Flat LAN Topologies - Mesh Versus Hierarchical-Mesh Topologies - Classic Three-Layer Hierarchical Model - Core Layer - Distribution Layer - Access Layer - Guidelines for Hierarchical Network Design - Redundant Network Design Topologies

- Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press

Page 6: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

- Backup Paths - Load Sharing - Modular Network Design - Cisco SAFE Security Reference Architecture - Designing a Campus Network Design Topology - Spanning Tree Protocol - Spanning Tree Cost Values - Rapid Spanning Tree Protocol - RSTP Convergence and Reconvergence - Selecting the Root Bridge - Scaling the Spanning Tree Protocol - Virtual LANs - Fundamental VLAN Designs - Wireless LANs - Positioning an Access Point for Maximum Cover-

age - WLANs and VLANs - Redundant Wireless Access Points - Redundancy and Load Sharing in Wired LANs - Server Redundancy - Workstation-to-Router Redundancy - Hot Standby Router Protocol - Gateway Load Balancing Protocol - Designing the Enterprise Edge Topology - Redundant WAN Segments - Circuit Diversity - Multihoming the Internet Connection - Virtual Private Networking - Site-to-Site VPNs - Remote-Access VPNs - Service Provider Edge - Secure Network Design Topologies - Planning for Physical Security - Meeting Security Goals with Firewall Topologies - Summary - Review Questions - Design Scenario

6 Designing Models for Addressing and - Guidelines for Assigning Network Layer Ad- - Oppenheimer, Priscilla. 2011, Top-Down

Page 7: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

Numbering dresses - Using a Structured Model for Network Layer - Addressing - Administering Addresses by a Central Authority - Distributing Authority for Addressing - Using Dynamic Addressing for End Systems - IP Dynamic Addressing - IP Version 6 Dynamic Addressing - Zero Configuration Networking - Using Private Addresses in an IP Environment - Caveats with Private Addressing - Network Address Translation - Using a Hierarchical Model for Assigning Ad-

dresses - Why Use a Hierarchical Model for Addressing

and - Routing? - Hierarchical Routing - Classless Interdomain Routing - Classless Routing Versus Classful Routing - Route Summarization (Aggregation) - Route Summarization Example - Route Summarization Tips - Discontiguous Subnets - Mobile Hosts - Variable-Length Subnet Masking - Hierarchy in IP Version 6 Addresses - Link-Local Addresses - Global Unicast Addresses - IPv6 Addresses with Embedded IPv4 Addresses - Designing a Model for Naming - Distributing Authority for Naming - Guidelines for Assigning Names - Assigning Names in a NetBIOS Environment - Assigning Names in an IP Environment - The Domain Name System - Dynamic DNS Names - IPv6 Name Resolution - Summary

Network Design. Indianapolis : Cisco Press

Page 8: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

- Review Questions - Design Scenario

7 Mid Test exam8 Selecting Switching and Routing Proto-

cols- Making Decisions as Part of the Top-Down Net-

work - Design Process - Selecting Switching Protocols - Switching and the OSI Layers - Transparent Bridging - Selecting Spanning Tree Protocol Enhancements - PortFast - UplinkFast and BackboneFast - Unidirectional Link Detection - LoopGuard - Protocols for Transporting VLAN Information - IEEE 802.1Q - Dynamic Trunk Protocol - VLAN Trunking Protocol - Selecting Routing Protocols - Characterizing Routing Protocols- Distance-Vector Routing Protocols - Link-State Routing Protocols - Routing Protocol Metrics - Hierarchical Versus Nonhierarchical Routing - Protocols - Interior Versus Exterior Routing Protocols - Classful Versus Classless Routing Protocols - Dynamic Versus Static and Default Routing - On-Demand Routing- Scalability Constraints for Routing Protocols - Routing Protocol Convergence - IP Routing - Routing Information Protocol- Enhanced Interior Gateway Routing Protocol - Open Shortest Path First- Intermediate System-to-Intermediate System - Border Gateway Protocol - Using Multiple Routing Protocols in an Internet-

work

- Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press

Page 9: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

- Routing Protocols and the Hierarchical Design - Model - Redistribution Between Routing Protocols - Integrated Routing and Bridging - A Summary of Routing Protocols - Summary- Review Questions - Design Scenario

9 Developing Network Security Strategies - Network Security Design - Identifying Network Assets - Analyzing Security Risks - Analyzing Security Requirements and Tradeoffs - Developing a Security Plan - Developing a Security Policy - Components of a Security Policy - Developing Security Procedures - Maintaining Security - Security Mechanisms - Physical Security - Authentication - Authorization - Accounting (Auditing) - Data Encryption - Public/Private Key Encryption - Packet Filters - Firewalls - Intrusion Detection and Prevention Systems - Modularizing Security Design - Securing Internet Connections - Securing Public Servers - Securing E-Commerce Servers - Securing Remote-Access and VPNs - Securing Remote-Access Technologies - Securing VPNs - Securing Network Services and Network- Management - Securing Server Farms - Securing User Services

- Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press

Page 10: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

- Securing Wireless Networks - Authentication in Wireless Networks - Data Privacy in Wireless Networks - Summary- Review Questions - Design Scenario

10 Developing Network Management Strategies

- Network Management Design - Proactive Network Management - Network Management Processes - Fault Management - Configuration Management - Accounting Management - Performance Management - Security Management - Network Management Architectures - In-Band Versus Out-of-Band Monitoring - Centralized Versus Distributed Monitoring - Selecting Network Management Tools and Proto-

cols - Selecting Tools for Network Management - Simple Network Management Protocol - Management Information Bases (MIB) - Remote Monitoring (RMON) - Cisco Discovery Protocol - Cisco NetFlow Accounting - Estimating Network Traffic Caused by Network- Management - Summary - Review Questions - Design Scenario - Summary for Part II

- Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press

11 Selecting Technologies and Devices for Campus Networks

- LAN Cabling Plant Design - Cabling Topologies- Building-Cabling Topologies- Campus-Cabling Topologies - Types of Cables - LAN Technologies - Ethernet Basics

- Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press

Page 11: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

- Ethernet and IEEE 802.3 - Ethernet Technology Choices - Half-Duplex and Full-Duplex Ethernet - 100-Mbps Ethernet - Gigabit Ethernet - 10-Gbps Ethernet - Selecting Internetworking Devices for a Campus - Network Design - Criteria for Selecting Campus Internetworking- Devices - Optimization Features on Campus Internetwork-

ing - Devices - Example of a Campus Network Design - Background Information for the Campus Network - Design Project - Business Goals - Technical Goals - Network Applications - User Communities - Data Stores (Servers) - Current Network at WVCC - Traffic Characteristics of Network Applications - Summary of Traffic Flows - Performance Characteristics of the Current Net-

work- Network Redesign for WVCC - Optimized IP Addressing and Routing for the - Campus Backbond- Wireless Network - Improved Performance and Security for the Edge

of - the Network - Summary - Review Questions - Design Scenario

12 Selecting Technologies and Devices for Enterprise Networks

- Remote-Access Technologies - PPP

- Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press

Page 12: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

- Multilink PPP and Multichassis Multilink PPP - Password Authentication Protocol and Challenge - Handshake- Authentication Protocol - Cable Modem Remote Access- Challenges Associated with Cable Modem Sys-

tems - Digital Subscriber Line Remote Access - Other DSL Implementations - PPP and ADSL - Selecting Remote-Access Devices for an Enter-

prise- Network Design - Selecting Devices for Remote Users - Selecting Devices for the Central Site - WAN Technologies- Systems for Provisioning WAN Bandwidth - Leased Lines - Synchronous Optical Network - Frame Relay - Frame Relay Hub-and-Spoke Topologies and - Subinterfaces - Frame Relay Congestion Control Mechanisms - Frame Relay Traffic Control - Frame Relay/ATM Interworking - ATM - Ethernet over ATM - Metro Ethernet - Selecting Routers for an Enterprise WAN Design- Selecting a WAN Service Provider - Example of a WAN Design - Background Information for the WAN Design

Project - Business and Technical Goals - Network Applications - User Communities - Data Stores (Servers) - Current Network- Traffic Characteristics of the Existing WAN

Page 13: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

- WAN Design for Klamath Paper Products - Summary - Review Questions - Design Scenario - Summary for Part III

13 Testing Your Network Design - Using Industry Tests - Building and Testing a Prototype Network Sys-

tem - Determining the Scope of a Prototype System - Testing a Prototype on a Production Network- Writing and Implementing a Test Plan for Your - Network Design - Developing Test Objectives and Acceptance Cri-

teria - Determining the Types of Tests to Run - Documenting Network Equipment and Other- Resources - Writing Test Scripts - Documenting the Project Timeline - Implementing the Test Plan - Tools for Testing a Network Design - Types of Tools - Examples of Network Testing Tools - CiscoWorks Internetwork Performance Monitor - WANDL Network Planning and Analysis Tools - OPNET Technologies - Ixia Tools - NetIQ Voice and Video Management Solution - NetPredict’s NetPredictor- Summary - Review Questions - Design Scenario

- Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press

14 Optimizing Your Network Design - Optimizing Bandwidth Usage with IP Multicast - Technologies - IP Multicast Addressing - Internet Group Management Protocol - Multicast Routing Protocols

- Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press

Page 14: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

- Distance Vector Multicast Routing Protocol - Protocol Independent Multicast - Reducing Serialization Delay - Link-Layer Fragmentation and Interleaving - Compressed Real-Time Transport Protocol - Optimizing Network Performance to Meet Quality

of - Service Requirements - IP Precedence and Type of Service- IP Differentiated Services Field - Resource Reservation Protocol - Common Open Policy Service Protocol - Classifying LAN Traffic - Cisco IOS Features for Optimizing Network- Performance - Switching Techniques - Classic Methods for Layer 3 Packet Switching - NetFlow Switching - Cisco Express Forwarding - Queuing Services - First-In, First-Out Queuing - Priority Queuing - Custom Queuing - Weighted Fair Queuing - Class-Based Weighted Fair Queuing - Low-Latency Queuing - Random Early Detection - Weighted Random Early Detection - Traffic Shaping - Committed Access Rate- Summary - Review Questions - Design Scenario

15 Documenting Your Network Design - Responding to a Customer’s Request for Pro-posal

- Contents of a Network Design Document - Executive Summary - Project Goal

- Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press

Page 15: Created By - Program Studi Informatika - Fakultas Ilmu ...if.binadarma.ac.id/sap/SAP jarkom(1).docx · Web viewDiscontiguous Subnets Mobile Hosts Variable-Length Subnet Masking Hierarchy

- Project Scope - Design Requirements - Business Goals - Technical Goals - User Communities and Data Stores - Network Applications - Current State of the Network - Logical Design- Physical Design - Results of Network Design Testing - Implementation Plan- Project Schedule - Project Budget - Return on Investment - Design Document Appendix - Summary - Review Questions - Design Scenario

16 Final Test Exam11. Evaluation :

12. Reference :

1. Oppenheimer, Priscilla. 2011, Top-Down Network Design. Indianapolis : Cisco Press